⤷ Title: Vulnerability Assessment and Penetration Testing
════════════════════════
𐀪 Author: Shubhamrawat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:36:06 GMT
════════════════════════
⌗ Tags: #vulnerability_assessment #penetration_testing
════════════════════════
𐀪 Author: Shubhamrawat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:36:06 GMT
════════════════════════
⌗ Tags: #vulnerability_assessment #penetration_testing
Medium
Vulnerability Assessment and Penetration Testing
Penetration testing, also known as “ethical hacking,” simulates real-world cyber attacks against your systems and networks. It involves a…
⤷ Title: Certified Ethical Hacking Course in Calicut — Start Today
════════════════════════
𐀪 Author: bilalinternship
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:01:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: bilalinternship
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:01:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking
Medium
Certified Ethical Hacking Course in Calicut — Start Today
Get hands-on training, real-world projects, and career support. Join Calicut’s leading cybersecurity course. Visit our website now…
⤷ Title: RCE in Apache OFBiz: What Devs Should Know About CVE-2023–49070
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:24:14 GMT
════════════════════════
⌗ Tags: #vulnerability #rce #cybersecurity
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:24:14 GMT
════════════════════════
⌗ Tags: #vulnerability #rce #cybersecurity
Medium
RCE in Apache OFBiz: What Devs Should Know About CVE-2023–49070
> About Author Hi, I’m Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for…
⤷ Title: Root-Me: SQL Injection — Authentication
════════════════════════
𐀪 Author: _marwankhodair_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:32 GMT
════════════════════════
⌗ Tags: #mssql #sql_server #sql_injection #sql #mysql
════════════════════════
𐀪 Author: _marwankhodair_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:32 GMT
════════════════════════
⌗ Tags: #mssql #sql_server #sql_injection #sql #mysql
Medium
Root-Me: SQL Injection — Authentication
Challenge Writeup by 0xMarvul
⤷ Title: Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Dork for AI LLM Chatbot
════════════════════════
𐀪 Author: rr-1k
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:26:55 GMT
════════════════════════
⌗ Tags: #llm #chatgpt #hacking #ai #bug_bounty
════════════════════════
𐀪 Author: rr-1k
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:26:55 GMT
════════════════════════
⌗ Tags: #llm #chatgpt #hacking #ai #bug_bounty
Medium
Dork for AI LLM Chatbot
Dork For AI Chatsbots ( Chagpt, gemini, grok, cluade and more )
⤷ Title: “Burp + Extensions = JS Recon on Steroids: From Endpoints to Exploits”
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:02:44 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ai #infosec #bug_bounty
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:02:44 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ai #infosec #bug_bounty
Medium
🧠 “Burp + Extensions = JS Recon on Steroids: From Endpoints to Exploits”
⚙️ Burp Extension Power Stack
⤷ Title: The Shodan & FOFA Hack No One Wants You to Know About
════════════════════════
𐀪 Author: KonaN
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:01:45 GMT
════════════════════════
⌗ Tags: #bug_hunting #bug_bounty #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: KonaN
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:01:45 GMT
════════════════════════
⌗ Tags: #bug_hunting #bug_bounty #hacking #cybersecurity #penetration_testing
Medium
The Shodan & FOFA Hack No One Wants You to Know About 👀
What if you could bypass API limits, export entire datasets, and never pay a cent? Here’s how I did it — and how you can too.
⤷ Title: Threat Modeling for Developers
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:40:31 GMT
════════════════════════
⌗ Tags: #application_security #devsecops #threat_modeling #secure_development #software_security
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:40:31 GMT
════════════════════════
⌗ Tags: #application_security #devsecops #threat_modeling #secure_development #software_security
Medium
Threat Modeling for Developers
In the fast-paced world of software development, the focus often gravitates towards features, performance, and user experience. While these…
⤷ Title: Sandboxing: A Safe Space for Dangerous Code
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:39:16 GMT
════════════════════════
⌗ Tags: #threat_mitigation #isolation #andboxing #application_security #code_security
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:39:16 GMT
════════════════════════
⌗ Tags: #threat_mitigation #isolation #andboxing #application_security #code_security
Medium
Sandboxing: A Safe Space for Dangerous Code
In our increasingly interconnected digital world, the need to interact with untrusted or potentially malicious code is not just a…
⤷ Title: HTB Challenge — CriticalOps
════════════════════════
𐀪 Author: MEGAZORD
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:47 GMT
════════════════════════
⌗ Tags: #challenge #htb_writeup #hacking #htb_walkthrough #web
════════════════════════
𐀪 Author: MEGAZORD
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:47 GMT
════════════════════════
⌗ Tags: #challenge #htb_writeup #hacking #htb_walkthrough #web
Medium
HTB Challenge — CriticalOps
Hello, hacker! This is the first writeup of a series of HTB challenges that I will try to maintain. And to start, we will have the…
⤷ Title: How Misconfigured Computer Accounts Lead to Hidden Privilege Escalation in Active Directory
════════════════════════
𐀪 Author: Sebastian Kandler
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:11:47 GMT
════════════════════════
⌗ Tags: #security #hacking #technology #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Sebastian Kandler
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:11:47 GMT
════════════════════════
⌗ Tags: #security #hacking #technology #penetration_testing #cybersecurity
Medium
How Misconfigured Computer Accounts Lead to Hidden Privilege Escalation in Active Directory
🛑 Did you know? Creating computer accounts in Active Directory Users and Computers (ADUC) and assigning a group like “Domain Users” sounds…
⤷ Title: Expert Lecture II
════════════════════════
𐀪 Author: unknownman
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:52:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #security_operation_center #hacking #penetration_testing #inkor
════════════════════════
𐀪 Author: unknownman
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:52:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #security_operation_center #hacking #penetration_testing #inkor
Medium
Expert Lecture II
Expert Lecture by Mr. M. Iman Karmawijaya, CTO Representative of LSware in Indonesia
⤷ Title: Top 10 WiFi Hacking Tools Used by Ethical Hackers: Introduction
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:44:28 GMT
════════════════════════
⌗ Tags: #wifihacking #ethical_hacker #wifi_hacking_tools #hacking #hackerslist
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:44:28 GMT
════════════════════════
⌗ Tags: #wifihacking #ethical_hacker #wifi_hacking_tools #hacking #hackerslist
Medium
Top 10 WiFi Hacking Tools Used by Ethical Hackers: Introduction
In this article, we’ll dive into the Top 10 WiFi Hacking Tools Used by Ethical Hackers, explore why they matter, understand how they work…
⤷ Title: The Digital Dojo: Mastering Offensive Security with AI-Powered Python Cyber Ranges
════════════════════════
𐀪 Author: SR
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:33:24 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #cybersecurity #security #hacking #python
════════════════════════
𐀪 Author: SR
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:33:24 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #cybersecurity #security #hacking #python
Medium
The Digital Dojo: Mastering Offensive Security with AI-Powered Python Cyber Ranges
In cybersecurity’s endless arms race, defenders must achieve perfection while attackers need only find a single weakness. This fundamental…
⤷ Title: DLL Injection: It’s Not as Scary as It Sounds
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:06:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #reverse_engineering #hacking #dll_injection #software_development
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:06:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #reverse_engineering #hacking #dll_injection #software_development
Medium
DLL Injection: It’s Not as Scary as It Sounds
“DLL? More like D-E-HELL!” …until now.
⤷ Title: Attacking Windows Credential Manager — HTB Module Walkthrough
════════════════════════
𐀪 Author: Redsnorlax
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:05:28 GMT
════════════════════════
⌗ Tags: #hacking #windows #windowscredentialmanager #uac #hackthebox
════════════════════════
𐀪 Author: Redsnorlax
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:05:28 GMT
════════════════════════
⌗ Tags: #hacking #windows #windowscredentialmanager #uac #hackthebox
Medium
Attacking Windows Credential Manager — HTB Module Walkthrough
Step-by-Step Walkthrough: Attacking Windows Credential Manager (HTB Module)
⤷ Title: Storm-2603 Strikes: DNS-Controlled Backdoor Found in Global Ransomware Attacks
════════════════════════
𐀪 Author: CYber VIaz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:55:38 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #cybersecurity #microsoft_security #infosec
════════════════════════
𐀪 Author: CYber VIaz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:55:38 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #cybersecurity #microsoft_security #infosec
Medium
💣 Storm-2603 Strikes: DNS-Controlled Backdoor Found in Global Ransomware Attacks
🚨 Cybersecurity Alert: A shadowy group named Storm‑2603 is wreaking havoc with stealthy backdoors, rogue web shells, and ransomware that…
⤷ Title: ChatGPT Leaks?
════════════════════════
𐀪 Author: Pascal Asch
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:46:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_leak #chatgpt
════════════════════════
𐀪 Author: Pascal Asch
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:46:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_leak #chatgpt
Medium
ChatGPT Leaks? How public share links turn into OSINT Goldmines — A real-world OSINT Tool for hunting leaked data.
1. Introduction
⤷ Title: DREAD Risk Assessment Model
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:38 GMT
════════════════════════
⌗ Tags: #dread_model #security_vulnerabilities #risk_assessment #threat_modeling #cybersecurity
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:38 GMT
════════════════════════
⌗ Tags: #dread_model #security_vulnerabilities #risk_assessment #threat_modeling #cybersecurity
Medium
DREAD Risk Assessment Model
The dynamic and ever-expanding landscape of cybersecurity demands robust frameworks for identifying, evaluating, and prioritizing risks…
⤷ Title: STRIDE Threat Modeling Methodology
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:41:49 GMT
════════════════════════
⌗ Tags: #threat_modeling #stride #risk_management #security_methodology #cybersecurity
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:41:49 GMT
════════════════════════
⌗ Tags: #threat_modeling #stride #risk_management #security_methodology #cybersecurity
Medium
STRIDE Threat Modeling Methodology
In the intricate landscape of modern software development, security can no longer be an afterthought, a patch applied late in the…